CFP last date
20 January 2025
Reseach Article

Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks

by T. Lalitha, R. Umarani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 16
Year of Publication: 2012
Authors: T. Lalitha, R. Umarani
10.5120/4908-7423

T. Lalitha, R. Umarani . Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks. International Journal of Computer Applications. 39, 16 ( February 2012), 40-43. DOI=10.5120/4908-7423

@article{ 10.5120/4908-7423,
author = { T. Lalitha, R. Umarani },
title = { Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 16 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 40-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number16/4908-7423/ },
doi = { 10.5120/4908-7423 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:25:15.430431+05:30
%A T. Lalitha
%A R. Umarani
%T Cluster based Efficient Key Management & Authentication Technique for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 16
%P 40-43
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes.The security attacks are due to the compromise of the large part of the network which can cause node damage or disturbance in the data flow. At the time of re-keying process, if the re-key from the sink is not securely transmitted to the compromised node, it will lead to denial of service attack. In this paper, we propose a cluster based key management technique for authentication in wireless sensor networks. Initially, clusters are formed in the network and the cluster heads are selected based on the energy cost, coverage and processing capacity. By simulation results, we show that the proposed approach recovers the compromised node in the secured manner.

References
  1. Mohammed A. Abuhelaleh and Khaled M. Elleithy “SECURITY IN WIRELESS SENSOR NETWORKS: KEY MANAGEMENT MODULE IN SOOAWSN”, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010.
  2. Yoon-Su Jeong, and Sang-Ho Lee “Secure Key Management Protocol in the Wireless Sensor Network”, International Journal of Information Processing Systems, Vol.2, No.1, March 2006.
  3. Binod Vaidya, Min Chen and Joel J. P. C. Rodrigues, “ Improved Robust User Authentication Scheme for Wireless Sensor Networks”, Fifth IEEE Conference on Wireless Communication and Sensor Networks (WCSN), pp1 – 6, 2009
Index Terms

Computer Science
Information Sciences

Keywords

Inter cluster Communication Cluster Based Key Management Sensor Networks